CVE-2014-6412
CVSS5.0
发布时间 :2018-04-12 17:29:00
修订时间 :2018-05-17 10:38:33
NMCPS    

[原文]WordPress before 4.4 makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach.


[CNNVD]WordPress 安全漏洞(CNNVD-201502-295)

        

WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。

WordPress中存在安全漏洞。攻击者可利用该漏洞执行未授权操作。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-640 [忘记口令恢复机制弱]

- CPE (受影响的平台与产品)

cpe:/a:wordpress:wordpress:-WordPress
cpe:/a:wordpress:wordpress:0.71WordPress 0.71
cpe:/a:wordpress:wordpress:1.0WordPress 1.0
cpe:/a:wordpress:wordpress:1.0.1WordPress 1.0.1
cpe:/a:wordpress:wordpress:1.0.2WordPress 1.0.2
cpe:/a:wordpress:wordpress:1.1.1WordPress 1.1.1
cpe:/a:wordpress:wordpress:1.2WordPress 1.2
cpe:/a:wordpress:wordpress:1.2.1WordPress 1.2.1
cpe:/a:wordpress:wordpress:1.2.2WordPress 1.2.2
cpe:/a:wordpress:wordpress:1.2.3WordPress 1.2.3
cpe:/a:wordpress:wordpress:1.2.4WordPress 1.2.4
cpe:/a:wordpress:wordpress:1.2.5WordPress 1.2.5
cpe:/a:wordpress:wordpress:1.2.5:aWordPress 1.2.5:a
cpe:/a:wordpress:wordpress:1.3WordPress 1.3
cpe:/a:wordpress:wordpress:1.3.2WordPress 1.3.2
cpe:/a:wordpress:wordpress:1.3.3WordPress 1.3.3
cpe:/a:wordpress:wordpress:1.5WordPress 1.5
cpe:/a:wordpress:wordpress:1.5.1WordPress 1.5.1
cpe:/a:wordpress:wordpress:1.5.1.1WordPress 1.5.1.1
cpe:/a:wordpress:wordpress:1.5.1.2WordPress 1.5.1.2
cpe:/a:wordpress:wordpress:1.5.1.3WordPress 1.5.1.3
cpe:/a:wordpress:wordpress:1.5.2WordPress 1.5.2
cpe:/a:wordpress:wordpress:1.6.2WordPress 1.6.2
cpe:/a:wordpress:wordpress:2.0WordPress 2.0
cpe:/a:wordpress:wordpress:2.0.1WordPress 2.0.1
cpe:/a:wordpress:wordpress:2.0.2WordPress 2.0.2
cpe:/a:wordpress:wordpress:2.0.4WordPress 2.0.4
cpe:/a:wordpress:wordpress:2.0.5WordPress 2.0.5
cpe:/a:wordpress:wordpress:2.0.6WordPress 2.0.6
cpe:/a:wordpress:wordpress:2.0.7WordPress 2.0.7
cpe:/a:wordpress:wordpress:2.0.8WordPress 2.0.8
cpe:/a:wordpress:wordpress:2.0.9WordPress 2.0.9
cpe:/a:wordpress:wordpress:2.0.10WordPress 2.0.10
cpe:/a:wordpress:wordpress:2.0.11WordPress 2.0.11
cpe:/a:wordpress:wordpress:2.1WordPress 2.1
cpe:/a:wordpress:wordpress:2.1.1WordPress 2.1.1
cpe:/a:wordpress:wordpress:2.1.2WordPress 2.1.2
cpe:/a:wordpress:wordpress:2.1.3WordPress 2.1.3
cpe:/a:wordpress:wordpress:2.2WordPress 2.2
cpe:/a:wordpress:wordpress:2.2.1WordPress 2.2.1
cpe:/a:wordpress:wordpress:2.2.2WordPress 2.2.2
cpe:/a:wordpress:wordpress:2.2.3WordPress 2.2.3
cpe:/a:wordpress:wordpress:2.3WordPress 2.3
cpe:/a:wordpress:wordpress:2.3.1WordPress 2.3.1
cpe:/a:wordpress:wordpress:2.3.2WordPress 2.3.2
cpe:/a:wordpress:wordpress:2.3.3WordPress 2.3.3
cpe:/a:wordpress:wordpress:2.5WordPress 2.5
cpe:/a:wordpress:wordpress:2.5.1WordPress 2.5.1
cpe:/a:wordpress:wordpress:2.6WordPress 2.6
cpe:/a:wordpress:wordpress:2.6.1WordPress 2.6.1
cpe:/a:wordpress:wordpress:2.6.2WordPress 2.6.2
cpe:/a:wordpress:wordpress:2.6.3WordPress 2.6.3
cpe:/a:wordpress:wordpress:2.6.5WordPress 2.6.5
cpe:/a:wordpress:wordpress:2.7WordPress 2.7
cpe:/a:wordpress:wordpress:2.7.1WordPress 2.7.1
cpe:/a:wordpress:wordpress:2.8WordPress 2.8
cpe:/a:wordpress:wordpress:2.8.1WordPress 2.8.1
cpe:/a:wordpress:wordpress:2.8.2WordPress 2.8.2
cpe:/a:wordpress:wordpress:2.8.3WordPress 2.8.3
cpe:/a:wordpress:wordpress:2.8.4WordPress 2.8.4
cpe:/a:wordpress:wordpress:2.8.4:aWordPress 2.8.4:a
cpe:/a:wordpress:wordpress:2.8.5WordPress 2.8.5
cpe:/a:wordpress:wordpress:2.8.5.1WordPress 2.8.5.1
cpe:/a:wordpress:wordpress:2.8.5.2WordPress 2.8.5.2
cpe:/a:wordpress:wordpress:2.8.6WordPress 2.8.6
cpe:/a:wordpress:wordpress:2.9WordPress 2.9
cpe:/a:wordpress:wordpress:2.9.1WordPress 2.9.1
cpe:/a:wordpress:wordpress:2.9.1.1WordPress 2.9.1.1
cpe:/a:wordpress:wordpress:2.9.2WordPress 2.9.2
cpe:/a:wordpress:wordpress:3.0WordPress 3.0
cpe:/a:wordpress:wordpress:3.0.1WordPress 3.0.1
cpe:/a:wordpress:wordpress:3.0.2WordPress 3.0.2
cpe:/a:wordpress:wordpress:3.0.3WordPress 3.0.3
cpe:/a:wordpress:wordpress:3.0.4WordPress 3.0.4
cpe:/a:wordpress:wordpress:3.0.5WordPress 3.0.5
cpe:/a:wordpress:wordpress:3.0.6WordPress 3.0.6
cpe:/a:wordpress:wordpress:3.1WordPress 3.1
cpe:/a:wordpress:wordpress:3.1.1WordPress 3.1.1
cpe:/a:wordpress:wordpress:3.1.2WordPress 3.1.2
cpe:/a:wordpress:wordpress:3.1.3WordPress 3.1.3
cpe:/a:wordpress:wordpress:3.1.4WordPress 3.1.4
cpe:/a:wordpress:wordpress:3.2WordPress 3.2
cpe:/a:wordpress:wordpress:3.2:beta1WordPress 3.2 Beta 1
cpe:/a:wordpress:wordpress:3.2.1WordPress 3.2.1
cpe:/a:wordpress:wordpress:3.3WordPress 3.3
cpe:/a:wordpress:wordpress:3.3.1WordPress 3.3.1
cpe:/a:wordpress:wordpress:3.3.2WordPress 3.3.2
cpe:/a:wordpress:wordpress:3.3.3WordPress 3.3.3
cpe:/a:wordpress:wordpress:3.4.0WordPress 3.4.0
cpe:/a:wordpress:wordpress:3.4.1WordPress 3.4.1
cpe:/a:wordpress:wordpress:3.4.2WordPress 3.4.2
cpe:/a:wordpress:wordpress:3.5.0WordPress 3.5.0
cpe:/a:wordpress:wordpress:3.5.1WordPress 3.5.1
cpe:/a:wordpress:wordpress:3.6
cpe:/a:wordpress:wordpress:3.6.1
cpe:/a:wordpress:wordpress:3.7
cpe:/a:wordpress:wordpress:3.7.1
cpe:/a:wordpress:wordpress:3.7.4
cpe:/a:wordpress:wordpress:3.7.5
cpe:/a:wordpress:wordpress:3.8
cpe:/a:wordpress:wordpress:3.8.1
cpe:/a:wordpress:wordpress:3.8.2
cpe:/a:wordpress:wordpress:3.8.3
cpe:/a:wordpress:wordpress:3.8.4
cpe:/a:wordpress:wordpress:3.9
cpe:/a:wordpress:wordpress:3.9.0
cpe:/a:wordpress:wordpress:3.9.1
cpe:/a:wordpress:wordpress:3.9.2
cpe:/a:wordpress:wordpress:3.9.3
cpe:/a:wordpress:wordpress:4.0
cpe:/a:wordpress:wordpress:4.0.1
cpe:/a:wordpress:wordpress:4.1
cpe:/a:wordpress:wordpress:4.1.1
cpe:/a:wordpress:wordpress:4.2
cpe:/a:wordpress:wordpress:4.2.1
cpe:/a:wordpress:wordpress:4.2.2
cpe:/a:wordpress:wordpress:4.2.3
cpe:/a:wordpress:wordpress:4.3.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6412
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6412
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201502-295
(官方数据源) CNNVD

- 其它链接及资源

http://packetstormsecurity.com/files/130380/WordPress-Failed-Randomness.html
(VENDOR_ADVISORY)  MISC  http://packetstormsecurity.com/files/130380/WordPress-Failed-Randomness.html
http://seclists.org/fulldisclosure/2015/Feb/42
(VENDOR_ADVISORY)  FULLDISC  20150211 CVE-2014-6412 - WordPress (all versions) lacks CSPRNG
http://seclists.org/fulldisclosure/2015/Feb/53
(VENDOR_ADVISORY)  FULLDISC  20150212 Followup on CVE-2014-6412
http://www.securityfocus.com/bid/72589
(VENDOR_ADVISORY)  BID  72589
http://www.securitytracker.com/id/1031749
(VENDOR_ADVISORY)  SECTRACK  1031749
https://bugzilla.redhat.com/show_bug.cgi?id=1192474
(VENDOR_ADVISORY)  CONFIRM  https://bugzilla.redhat.com/show_bug.cgi?id=1192474
https://core.trac.wordpress.org/ticket/28633
(VENDOR_ADVISORY)  CONFIRM  https://core.trac.wordpress.org/ticket/28633

- 漏洞信息

WordPress 安全漏洞
2015-02-13 00:00:00 2015-02-13 00:00:00
远程  
        

WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。

WordPress中存在安全漏洞。攻击者可利用该漏洞执行未授权操作。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        https://wordpress.org/download/

- 漏洞信息 (F130380)

WordPress Failed Randomness (PacketStormID:F130380)
2015-02-12 00:00:00
Scott Arciszewski  
advisory
CVE-2014-6412
[点击下载]

All versions of WordPress fail to implement a cryptographically secure pseudorandom number generator.

Ticket opened: 2014-06-25
Affected Versions: ALL
Problem: No CSPRNG
Patch available, collecting dust because of negligent (and questionably
competent) WP maintainers

On June 25, 2014 I opened a ticked on WordPress's issue tracker to expose a
cryptographically secure pseudorandom number generator, since none was
present (although it looks like others have tried to hack together a
band-aid solution to mitigate php_mt_seed until WordPress gets their "let's
support PHP < 5.3" heads out of their asses).

For the past 8 months, I have tried repeatedly to raise awareness of this
bug, even going as far as to attend WordCamp Orlando to troll^H advocate
for its examination in person. And they blew me off every time.

If anyone with RNG breaking experience (cough solar designer cough) can PoC
it, without the patch I've provided you should be able to trivially predict
the password reset token for admin users and take over any WordPress site
completely.

Eight fucking months.

Patch available with unit tests and PHP 5.2 on Windows support at
https://core.trac.wordpress.org/attachment/ticket/28633/28633.3.patch

Scott
https://scott.arciszewski.me
@voodooKobra


    

- 漏洞信息

WordPress CVE-2014-6412 Security Weakness
Design Error 72589
Yes No
2015-02-10 12:00:00 2015-02-10 12:00:00
Scott Arciszewski

- 受影响的程序版本

WordPress WordPress 0

- 漏洞讨论

WordPress is prone to a security weakness.

An attacker can exploit this issue to perform certain unauthorized actions.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站